Abstract

Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique.Â

Highlights

  • The processes of authentication of digital data over internet checks and verify the content of data received by the receiver is original and not tampered

  • Some cryptography technique based on symmetric key cryptography and some are based on asymmetric key cryptography

  • Any involved party must register his public key with a central authority, which is known as the Certificate Authority (CA)

Read more

Summary

Introduction

The processes of authentication of digital data over internet checks and verify the content of data received by the receiver is original and not tampered. For the process of authentication used various cryptography techniques. The process of digital signature authenticates the data and content of message from the both side sender and receiver. In the process of sender and receiver send the electronic document for another party. For authentication of sender and receiver used various message protocol by different user in concern of content validation. For the improvement of the strength of digital signature used various cryptography and hash function. A day’s various authors used cure based function for the authentication of digital signature. The curve cryptography technique is used point and coordinate distribution function for the mapping and signature of data. He/she sends the generated signature, a document and his\her public key to any verifier. A verifier can check the validity of the signature with the corresponding public key.

Digital signature
Related work
Findings
Problem Formulation
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.